Protecting against today’s rapidly evolving threat landscape requires broad and deep visibility across the entire IT environment. Threats and risks arrive from many angles and evidence of their existence can be found within existing log and machine data. Deeper, essential visibility is gained through targeted host and network forensic monitoring. When this is applied to multiple, machine-automated analysis techniques, threats and risks are exposed like never before.
- Google Now adds data from Lyft, Airbnb and many more apps
- Outlook app for Android and iOS boosts Microsoft's mobile comeback
- MIT randomizes tasks to speed massive multicore processors
- NEC aims at Big Data 'sweet spot' with new SAP Hana tool
- Uber will fight to keep its Boston ride data private
- Verizon to allow opt-out from mobile 'supercookies'
- Brief: Tesla boosts 0-60 acceleration with over-the-air software upgrade
- AT&T will pay $18.2B as top bidder in mobile spectrum auction
- BMW cars found vulnerable in Connected Drive hack
- Twitter's Vine Kids app is not just for kids
- Apple puts the big hurt on Samsung
- Google Glass holds promise but requires a 'reset'
- Microsoft updates cloud-based SQL Server to simplify management
- Intuit backpedals from TurboTax changes after upgrade uproar
- Can't keep this bad boy down: ZeroAccess botnet back in business